Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018

Similar documents
Physical Security Reliability Standard Implementation

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMMENTS OF CTIA - THE WIRELESS ASSOCIATION

Cellular Phone Control System for Prisons and Corrective Services Facilities

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017

Madam Chair, the Secure World Foundation (SWF) extend our congratulations to you on your

RESOLUTION 47 (Rev. Buenos Aires, 2017)

Inter-American Port Security Cooperation Plan

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Public Safety Communications Evolution

Text-to-9-1-1: A Reference Document. February 2013

AEC Broadband Update 2018

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

The President s Spectrum Policy Initiative

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Organization of Scientific Area Committees for Forensic Science (OSAC)

SBC Long Distance Application - Personal Communications Industry Association Comments. Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C.

presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES

Federal Initiatives for Wireless Innovation & Measurement

Content. Privacy Policy

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

Instructions for Part I of the CWIC and Community Partner Work Incentives Counselor Assessment and Certification Process

UC Santa Cruz Wireless Access Policy

Mapping to the National Broadband Plan

NYSVMS WEBSITE PRIVACY POLICY

Views on the Framework for Improving Critical Infrastructure Cybersecurity

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Open Data Policy City of Irving

Appendix 3 Disaster Recovery Plan

TERMS OF REFERENCE. Scaling-up Renewable Energy Program (SREP) Joint Mission. Lesotho

Mobile Application Privacy Policy

Tri-County Communications Cooperative, Inc. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Mobile Communications for Transit

United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS

EMERGING ISSUES IN THE DEVELOPMENT OF A NATIONAL BROADBAND PLAN

OPEN Networks - Future Worlds Consultation

Defense Coastal/Estuarine Research Program (DCERP) SERDP RC DCERP Data Policy Version 2.0

ARC BRIEF. ISA100 and Wireless Standards Convergence. By Harry Forbes

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

Information technology security and system integrity policy.

ICGI Recommendations for Federal Public Websites

Harmony Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

The Global Research Council

Before the National Telecommunications and Information Administration Department of Commerce Washington, DC ) ) ) ) )

Decommissioning Legacy Networks

CCC RESPONSES TO CIC INDUSTRY DATA ACCESS AND SHARING TASK FORCE QUESTIONS

Canada's New Anti-spam Law Are you prepared? Tricia Kuhl (Blakes) Dara Lambie (Blakes) Presented to ACC Ontario Chapter May 9, 2012

Legal and Regulatory Developments for Privacy and Security

CHAPTER 13 ELECTRONIC COMMERCE

A Trusted Information Network for the National Responder Community

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Standard CIP Cyber Security Critical Cyber Asset Identification

PENN MANOR SCHOOL DISTRICT

Annual Report for the Utility Savings Initiative

Request for Information Strategies to Improve Maritime Supply Chain Security and Achieve 100% Overseas Scanning

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

July 1, 2015 VIA ELECTRONIC FILING. Marlene H. Dortch, Secretary Federal Communications Commission th Street, SW Washington, DC 20554

Telecommunications Regulation. TAIWAN Tsar & Tsai Law Firm

2. Ecotel is a Canadian infrastructure based Mobile Network Operator (MNO) that is fully

SAN IPSE CAPITAL OF SILICON VALLEY

Testimony of Bethanne Cooley Director, State Legislative Affairs CTIA The Wireless Association December 2 nd, 2015 Support for H3747

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

Survey on Patient Safety Culture Database Data Use Agreement

National Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Along for the Ride Reducing Driver Distractions

Strategic & Operational Planning:

Sarri Gilman Privacy Policy

The Beyond the Border Action Plan

Decommissioning Legacy Networks

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC

Council of the European Union Brussels, 23 November 2016 (OR. en)

Advanced Two-Way Metering. Looking Forward

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

CONFERENCE OF EUROPEAN STATISTICIANS ACTIVITIES ON CLIMATE CHANGE-RELATED STATISTICS

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036

BIOEVENTS PRIVACY POLICY

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!

I-95 Corridor Coalition. Multi-State VMT-Based Road-User Fee Initiative. Mark F. Muriello

Endpoint Security for Wholesale Payments

NCSC Study on Court Reporters

Before the Federal Communications Commission Washington, DC ) ) ) ) ) ) ) COMMENTS OF THE ALLIANCE FOR TELECOMMUNICATIONS INDUSTRY SOLUTIONS

Tularosa Communications, Inc. (TCI) General Service Terms and Conditions

Draft Resolution for Committee Consideration and Recommendation

JOINT STATEMENT BY THE MINISTRY OF ENERGY OF THE RUSSIAN FEDERATION AND THE INTERNATIONAL ENERGY AGENCY

CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016

COMMENTS OF INFORMATION TECHNOLOGY AND INNOVATION FOUNDATION. Richard Bennett

Cybersecurity and the Role of Mobile Financial Transactions. Jackie McCarthy Director, Regulatory Affairs NCSL Capitol Forum December 5, 2016

Vulnerability Disclosure Policy. v.1.1

National Cybersecurity Center of Excellence (NCCoE) Energy Sector Asset Management

Before the. Federal Communications Commission. Washington, D.C ) ) ) ) COMMENTS OF PUBLIC KNOWLEDGE AND THE NEW AMERICA FOUNDATION

Five-Year Strategic Plan

Testimony of Benjamin Aron Director, State Regulatory and External Affairs CTIA Support for Arizona House Bill 2365 February 7 th, 2017

Digital TV Group (DTG) response to the BBC Trust s Canvas Proposals Provisional Conclusions

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

Transcription:

Testimony of Gerard Keegan CTIA Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 On behalf of CTIA, the trade association for the wireless communications industry, thank you for the opportunity to testify on the wireless industry s efforts to help the corrections community combat the problem of wireless device contraband in our nation s correctional facilities. Wireless carriers have no legitimate users imprisoned or detained in correctional facilities and no interest in seeing inmates use wireless services for any reason. We fully support policymakers efforts to keep contraband wireless phones out of correctional institutions. We are dedicated to continue our work to develop and implement measures to help solve this problem while preserving the ability for law-abiding members of the public to continue to reliably access the wireless services provided by CTIA s member companies. Recently, the wireless industry has devoted significant resources and funding to help combat this problem. In April, we formed a task force consisting of corrections officials, wireless carrier representatives, and FCC staff and brought on Dr. Charles Clancy to administer a test bed of Contraband Interdiction System (CIS) technologies, including jamming. Dr. Clancy is a professor of electrical engineering at Virginia Tech, where he directs the Hume Center for National Security and Technology. Prior to joining Virginia Tech, he led wireless technology research programs at the National Security Agency. In that role, he worked on a range of cellphone-related programs. Dr. Clancy is

an internationally-recognized expert in wireless security, has chaired standards committees within the IETF and Wireless Innovation Forum, and has testified before Congress. He is co-author of 5 books, 22 patents, and over 200 academic papers on wireless communications. Dr. Clancy and a team from the Virginia Tech Applied Research Corporation will begin testing CIS technologies at his lab in Arlington, VA, and will then conduct field testing at two correctional facilities. After he completes his testing, Dr. Clancy will draft a report summarizing the test results of the various CIS technologies. Amongst other things, the reports generated under this effort will include (1) technology assessments, (2) key metrics for each technology, (3) best practices on deployment of the CIS technologies, and (4) an evaluation of the viability of the technologies tested. While we originally intended for this to be a 12 to 16 month project, we condensed it down to 8 months at the request of the corrections officials on the task force. Accordingly, our goal now is to complete testing and issue Dr. Clancy s report by the end of the calendar year. To meet this expedited timeframe, we have been working at a rapid pace over the past several months. The task force held its first face-to-face meeting in April and then held a vendor workshop and our second task force meeting in June. Earlier this month, we issued a solicitation for CIS vendors to submit applications to participate in the test bed. On August 10, we will hold our third task force meeting at Dr. Clancy s lab in Arlington, VA. Dr. Clancy intends to begin testing at the lab as soon as next week. Notably, our first field test site will be Lee Correctional Institution in Bishopville. Dr. Clancy and his team will be conducting their initial site visit at Lee next month with the 2

expectation to begin testing in September. We also plan to hold our fourth task force meeting at Lee, likely in October. The task force has also been busy evaluating legal and administrative practices, including court orders, for directing carriers to take action against contraband devices. Moreover, CTIA and our members have been working closely with Director Stirling to develop a court order process that would direct wireless carriers to disable commercial service to a device identified as contraband. Additionally, the wireless industry has been working diligently to deploy the stolen phones database for use in combatting contraband devices in correctional facilities. Carriers are able to render SIM cards inoperable, but we have heard that inmates often swap out SIM cards. We now believe we will be able to render wireless service inoperable to a contraband device so that wireless service will not work even if inmates swap out SIM cards. To do this, we are going to extend the existing stolen phone database to contraband devices. As I hope our recent efforts make clear, helping to eliminate contraband phones in prisons is a wireless industry priority. Over the past decade, CTIA and its member companies have actively worked with managed access and cell detection technology vendors to identify approaches that would curb the use of contraband cell phones in prisons. To facilitate the deployment of managed access systems, wireless carriers have entered into numerous spectrum lease agreements with multiple providers, including one recently in South Carolina. In addition, we have provided significant technical assistance to these vendors to address operability challenges and prevent interference with cellular networks. We are firmly committed to doing more. 3

The wireless industry has worked, and will continue to work, collaboratively with various stakeholders, including corrections officials, to address the serious problem of contraband wireless devices. The wireless industry and corrections facilities have embraced managed access technologies as an effective means of preventing unauthorized wireless communications within prisons. While jamming has been cited as a means of curbing contraband device use, there are harmful side effects to the use of jamming technologies, which is why the use of jammers is generally prohibited under federal law. Managed Access. Managed access and other detection systems have proven effective in combating the use of contraband wireless devices in prisons. Managed access systems are micro-cellular, private networks that analyze transmission to and from wireless devices to determine whether the device is authorized to access public carrier networks. Managed access system base stations capture voice, text, and data communications within the system s coverage area and cross-check the identifying information of the device against a list of authorized devices. If the device is not authorized, communications are terminated. Meanwhile, users of authorized devices may continue to access public carrier networks as they normally would. To operate managed access systems, operators of these private networks require a right to transmit over valuable commercial mobile spectrum licensed to commercial wireless carriers. Wireless carriers whose licensed service areas overlap the footprint of state or local corrections facilities work with managed access system providers to arrange for access to spectrum. Once consent is obtained from the carrier, a lease 4

application is filed with the FCC to enable managed access system deployment on the carrier s spectrum. Managed access systems have been deployed throughout the country and are currently used at a number of state and local corrections facilities. The wireless industry favors managed access systems because they block unauthorized communications, reduce incentives for parties to smuggle contraband phones into prisons, and permit lawful communications to take place without interruption or degradation. Jammers. Our members have committed to assessing the impact of certain jammers on their networks as part of the test bed process discussed earlier. Under current law, though, jamming by non-federal entities constitutes an unlawful interference with radio communications in violation of Section 333 of the Communications Act. Consistent with this law, the FCC has taken swift and forceful action against the users and manufacturers of these unlawful devices. And there are sound policy and technical reasons for this, as jamming has proven it can be an overly blunt instrument. By blocking all wireless communications inside and near corrections facilities, legitimate communications are blocked and, if the jammer fails, corrections officials have no further recourse against users of contraband phones. More recently some of our member companies with operations along the border have experienced harmful interference from jammers operating in Mexico. This creates an extremely dangerous situation for lawful wireless users outside prison walls, who may find a critical call to 911 blocked by a malfunctioning or over-inclusive jammer. Moreover, jamming can disrupt service in the spectrum outside of the targeted 5

commercial band. Public safety radio communications, for example, operating in the 700 MHz and 800 MHz would be put at risk of interference from jammers, given their close proximity to commercial operations in those bands. Because of these issues, we have concerns with the use of cell phone jammers in correctional facilities. Note, however, that to the extent vendors of jamming technology choose to participate in the CIS Testbed evaluation, an assessment of jamming technology will be included in Dr. Clancy s final report. We aim to evaluate jammers in both the lab and one of the field tests. In closing, we stand committed to continue our work with federal and state officials, public safety representatives, and technology providers to combat this problem. Thank you for the opportunity to testify today. 6